CN105607938B - Security application interface elements configuration method - Google Patents
Security application interface elements configuration method Download PDFInfo
- Publication number
- CN105607938B CN105607938B CN201511009485.1A CN201511009485A CN105607938B CN 105607938 B CN105607938 B CN 105607938B CN 201511009485 A CN201511009485 A CN 201511009485A CN 105607938 B CN105607938 B CN 105607938B
- Authority
- CN
- China
- Prior art keywords
- security
- security application
- interface elements
- configuration method
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The invention proposes security application interface elements configuration method, the method includes:For the different third party's clients buildings run on the user terminal with credible performing environment respectively from the associated element allocation models of different security applications and be stored in database;Third party's client selection target security application and credible performing environment manager into user terminal sends element acquisition request according to user instructions;Credible performing environment manager is inquired with selected targeted security from database using associated element allocation models, and is obtained response based on the element allocation models establishing element inquired and element acquisition response is sent back third party's client and allow it to present with selected targeted security to user using associated element.Security application interface elements configuration method disclosed in this invention has high configuration flexibility and good compatibility.
Description
Technical field
The present invention relates to interface elements configuration methods, more particularly, to security application interface elements configuration method.
Background technique
Currently, increasingly extensive and different field the type of business applied with computer and networks becomes increasingly abundant,
It is running on credible performing environment(TSM)User terminal(Such as mobile terminal)On third party's client on needle is presented
To different security applications(Such as the payment application in financial field)Distinct interface element(Such as interface elements)Combination becomes
It obtains more and more important.
In existing technical solution, configures and manage typically with the following two kinds mode and answered for different safeties
Interface elements are presented:(1) in the first way, use the mode of customization ecosystem APP in advance for different clients
End and interface provide specific interface elements;(2)In the second way, using the side of the page encapsulation based on HTML5 agreement
Method, nesting HTML5 page configuration and management are for different clients and the special interface element at interface in interface chamber.
However, there are the following problems for above-mentioned existing technical solution:(1)For first way, due to the mode of customization
Lack flexibility, therefore needs to update client release when interface elements need to adjust, therefore complicated for operation;(2)For
Two kinds of modes are locally stored calling and local file access due to that can not realize, therefore have limitation functionally, and
Need to occupy more system resource.
Accordingly, there exist following demands:There is provided, there is the flexibility of configuration and the security application of good compatibility to connect
Mouth element configuring method.
Summary of the invention
In order to solve the problems existing in the prior art scheme, the invention proposes have configuration flexibility and
The security application interface elements configuration method of good compatibility.
The purpose of the present invention is what is be achieved through the following technical solutions:
A kind of security application interface elements configuration method, the security application interface elements configuration method includes following
Step:
(A1)For the different third party's client buildings point run on the user terminal with credible performing environment
Not from the associated element allocation models of different security applications and be stored in database;
(A2)Third party's client selection target security application and into the user terminal according to user instructions
Credible performing environment manager send element acquisition request;
(A3)The credible performing environment manager is looked into from the database after receiving the element acquisition request
It askes and applies associated element allocation models with selected targeted security, and based on the element allocation models building inquired
Element obtains response and element acquisition response is sent back third party's client and allows it to present to user
Associated element is applied with selected targeted security.
In scheme disclosed above, it is preferable that the element allocation models includes element, the member comprising several elements
Plain group and the element group policy comprising several element groups, wherein the element is for the most basic of specific security application
Element, the element group indicates corresponding with the particular community of business provided by security application or function several respectively
The set of element, the element group policy is the set of several element groups, with the identifier of security application and the safety
It is corresponded using the type of provided business.
In scheme disclosed above, it is preferable that the element acquisition request include and selected targeted security
Using the identifier of associated element group policy, the identifier is set in advance in described by third party client provider
In tripartite's client.
In scheme disclosed above, it is preferable that the credible performing environment manager is obtained receiving the element
The element group policy according to included in the element acquisition request after request is taken to indicate clothes inquiry and institute from the database
The targeted security of selection applies associated element allocation models, and parse the element in the element allocation models that inquires and
Element group is obtained in response message with being assembled to element.
In scheme disclosed above, it is preferable that described to apply associated element with selected targeted security
Allocation models defines user interface or pop-up formula prompt information for executing specific function.
In scheme disclosed above, it is preferable that described to apply associated element with selected targeted security
Allocation models definition application is recommended, and the application recommendation includes text envelope relevant to the display of security application to be recommended
One or more of breath, footmark, brightness, size, color.
In scheme disclosed above, it is preferable that the step(A3)Further comprise:It is obtained receiving the element
After taking response, third party's client applies associated element allocation models dynamic according to selected targeted security
Ground generates user interface and applies associated element with selected targeted security to present to user.
In scheme disclosed above, it is preferable that verification is answered with selected targeted security one of as follows
With the legitimacy of associated element:(1)Third party's client is based on the verification of scheduled checking algorithm and selected mesh
Mark the legitimacy of the associated element of security application;(2)The credible performing environment manager is verified using background server
The legitimacy of associated element is applied with selected targeted security;(3)Third party's client credible is held with described
Row environment manager verifies the legitimacy that associated element is applied with selected targeted security with being combined, i.e., and described the
Simple verification early period of tripartite's client executing, the credible performing environment manager execute complicated later period verification.
In scheme disclosed above, it is preferable that any element allocation models stored in the database can be by
It is freely set according to actual needs, to neatly change the presentation of element associated with any security application.
Security application interface elements configuration method disclosed in this invention has the following advantages that:It is flexible with high configuration
Property and good compatibility and scalability, and occupy less system resource.
Detailed description of the invention
In conjunction with attached drawing, technical characteristic of the invention and advantage will be more fully understood by those skilled in the art, wherein:
Fig. 1 is the flow chart of the security application interface elements configuration method of embodiment according to the present invention.
Specific embodiment
Fig. 1 is the flow chart of the security application interface elements configuration method of embodiment according to the present invention.Such as Fig. 1 institute
Show, security application interface elements configuration method disclosed in this invention includes the following steps:(A1)For run on have can
Believe the user terminal of performing environment(Such as mobile terminal)On different third party's clients buildings respectively from different safety
Property using associated element allocation models and being stored in database;(A2)Third party's client refers to according to user
It enables selection target security application and the credible performing environment manager into the user terminal sends element acquisition request;
(A3)The credible performing environment manager after receiving the element acquisition request from the database inquiry with it is selected
The targeted security selected applies associated element allocation models, and is obtained based on the element allocation models establishing element inquired
Response and by the element acquisition response send back third party's client allow it to user present with it is selected
Targeted security apply associated element.
Preferably, in security application interface elements configuration method disclosed in this invention, the element allocation models
Including element, the element group comprising several elements and the element group policy comprising several element groups, wherein the element is needle
To the most basic element of specific security application(Such as each element may include one or more of fields:Word
Name section(The title shown for client end interface), field label(Identification and binding for client to element), prompt
Information(The official documents and correspondence information prompted when corresponding to client trigger action), the page initialization when state(When indicating page initialization
Whether the element is presented on the page)Etc.), the element group indicates specific with business provided by security application respectively
The set of attribute or the corresponding several elements of function(For example, for the payment application in financial field, the element group can be with
It is one or more of following:Holder's identity information group(It includes holder's identity-related information, such as holder's surname
Name, type of credential, passport NO., cell-phone number, identifying code etc.), debit account information group(It includes debit card card number and passwords
Information), credit account information group(It includes credit card card number, cvn2 and validity period information)And general information group(It includes
The banks such as electronic cash particular attribute)), the element group policy is the set of several element groups, the mark with security application
The type for knowing business provided by symbol and the security application corresponds.
Preferably, in security application interface elements configuration method disclosed in this invention.The element acquisition request
Identifier comprising applying associated element group policy with selected targeted security, the identifier is by third party client
End provider is set in advance in third party's client.
Preferably, in security application interface elements configuration method disclosed in this invention, the credible performing environment
Manager element group policy according to included in the element acquisition request after receiving the element acquisition request indicates
Clothes are inquired from the database applies associated element allocation models with selected targeted security, and parses and inquire
Element allocation models in element and element group be assembled to element obtain response message in.
Preferably, in security application interface elements configuration method disclosed in this invention, described and selected mesh
The mark associated element allocation models of security application defines user interface or the prompt of pop-up formula for executing specific function
Information.
Preferably, in security application interface elements configuration method disclosed in this invention, described and selected mesh
It marks the associated element allocation models definition application of security application to recommend, the application recommendation includes and safety to be recommended
One or more of the relevant text information of the display of application, footmark, brightness, size, color(Specific application is promoted to arrange
Sequence in table, and some special efficacys are added, give user eye-catching visual effect).
Preferably, in security application interface elements configuration method disclosed in this invention, the step(A3)Into one
Step includes:After receiving the element and obtaining response, third party's client is answered according to selected targeted security
User interface is dynamically generated with associated element allocation models to present and selected targeted security application to user
Associated element.
Preferably, in security application interface elements configuration method disclosed in this invention, one of as follows school
Test the legitimacy that associated element is applied with selected targeted security:(1)Third party's client is based on scheduled
The legitimacy of associated element is applied in checking algorithm verification with selected targeted security(Such as data format or length,
The verification of data type);(2)The credible performing environment manager utilizes background server verification and selected targeted security
Property apply associated element legitimacy(Such as service logic verification);(3)Third party's client credible is held with described
Row environment manager verifies the legitimacy that associated element is applied with selected targeted security with being combined, i.e., and described the
Simple verification early period of tripartite's client executing, the credible performing environment manager execute complicated later period verification(Such as gold
Melt the bank card card bin verification in field, bank card borrows or lends money attribute verification, regular expression verification etc.).
Preferably, it in security application interface elements configuration method disclosed in this invention, is stored in the database
Any element allocation models can be freely set according to actual needs, thus neatly change with any safety
Using the presentation of associated element.
Therefore security application interface elements configuration method disclosed in this invention has following advantages:With height
Configuration flexibility and good compatibility and scalability, and occupy less system resource.
Although the present invention is described by above-mentioned preferred embodiment, way of realization is not limited to
Above-mentioned embodiment.It should be realized that:In the case where not departing from spirit and scope of the present invention, those skilled in the art can be with
Different change and modification are made to the present invention.
Claims (9)
1. a kind of security application interface elements configuration method, the security application interface elements configuration method includes following step
Suddenly:
(A1)For the different third party's clients buildings run on the user terminal with credible performing environment respectively with
The associated element allocation models of different security applications is simultaneously stored in database;
(A2)Third party's client according to user instructions selection target security application and into the user terminal can
Believe that performing environment manager sends element acquisition request;
(A3)The credible performing environment manager after receiving the element acquisition request from the database inquiry with
Selected targeted security applies associated element allocation models, and based on the element allocation models establishing element inquired
It obtains response and element acquisition response is sent back into third party's client and allow it to user's presentation and institute
The targeted security of selection applies associated element.
2. security application interface elements configuration method according to claim 1, which is characterized in that the element configures mould
Type includes element, the element group comprising several elements and the element group policy comprising several element groups, wherein the element is
For the most basic element of specific security application, the element group indicate respectively with business provided by security application
The set of particular community or the corresponding several elements of function, the element group policy is the set of several element groups, with peace
The combination of the type of business provided by the identifier of full property application and the security application corresponds.
3. security application interface elements configuration method according to claim 2, which is characterized in that the element acquisition is asked
The identifier comprising applying associated element group policy with selected targeted security is sought, the identifier is by third party visitor
Family end provider is set in advance in third party's client.
4. security application interface elements configuration method according to claim 3, which is characterized in that the credible execution ring
Border manager element group policy table according to included in the element acquisition request after receiving the element acquisition request
Show that clothes are inquired from the database with selected targeted security using associated element allocation models, and parses inquiry
Element in element allocation models and element group out is obtained in response message with being assembled to element.
5. security application interface elements configuration method according to claim 4, which is characterized in that it is described with it is selected
Targeted security defines user interface for executing specific function using associated element allocation models or pop-up formula mentions
Show information.
6. security application interface elements configuration method according to claim 5, which is characterized in that it is described with it is selected
Targeted security is recommended using the definition application of associated element allocation models, and the application recommendation includes and safety to be recommended
Property application the relevant text information of display, footmark, brightness, size, one or more of color.
7. security application interface elements configuration method according to claim 6, which is characterized in that the step(A3)Into
One step includes:After receiving the element and obtaining response, third party's client according to selected targeted security
User interface is dynamically generated using associated element allocation models to answer to present to user with selected targeted security
With associated element.
One of 8. security application interface elements configuration method according to claim 7, which is characterized in that as follows
Verify the legitimacy that associated element is applied with selected targeted security:(1)Third party's client is based on predetermined
Checking algorithm verification with selected targeted security using associated element legitimacy;(2)The credible execution ring
Border manager verifies the legitimacy that associated element is applied with selected targeted security using background server;(3)Institute
Third party's client is stated to verify with being combined and selected targeted security application phase with the credible performing environment manager
The legitimacy of associated element, wherein simple verification early period of third party's client executing, the credible performing environment pipe
It manages device and executes complicated later period verification.
9. security application interface elements configuration method according to claim 8, which is characterized in that deposited in the database
Any element allocation models of storage can be freely set according to actual needs, to neatly change and any safety
Property apply associated element presentation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511009485.1A CN105607938B (en) | 2015-12-30 | 2015-12-30 | Security application interface elements configuration method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511009485.1A CN105607938B (en) | 2015-12-30 | 2015-12-30 | Security application interface elements configuration method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105607938A CN105607938A (en) | 2016-05-25 |
CN105607938B true CN105607938B (en) | 2018-11-27 |
Family
ID=55987892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511009485.1A Active CN105607938B (en) | 2015-12-30 | 2015-12-30 | Security application interface elements configuration method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105607938B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169762B (en) * | 2017-05-24 | 2020-02-07 | 中国银联股份有限公司 | Configuration method and device of security carrier |
CN110083839B (en) * | 2019-04-29 | 2023-08-22 | 珠海豹好玩科技有限公司 | Text importing method, device and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6110229A (en) * | 1997-02-21 | 2000-08-29 | International Intelligent Information Co., Ltd. | User environment transfer system of information apparatus |
CN103516666A (en) * | 2012-06-20 | 2014-01-15 | 中国银联股份有限公司 | Safety information interaction device and method |
CN104111828A (en) * | 2013-04-22 | 2014-10-22 | 易保网络技术(上海)有限公司 | Automatic generation method and system of human-computer interaction interface |
-
2015
- 2015-12-30 CN CN201511009485.1A patent/CN105607938B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6110229A (en) * | 1997-02-21 | 2000-08-29 | International Intelligent Information Co., Ltd. | User environment transfer system of information apparatus |
CN103516666A (en) * | 2012-06-20 | 2014-01-15 | 中国银联股份有限公司 | Safety information interaction device and method |
CN104111828A (en) * | 2013-04-22 | 2014-10-22 | 易保网络技术(上海)有限公司 | Automatic generation method and system of human-computer interaction interface |
Also Published As
Publication number | Publication date |
---|---|
CN105607938A (en) | 2016-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI717728B (en) | Identity verification and login method, device and computer equipment | |
US9047462B2 (en) | Computer account management system and realizing method thereof | |
CN104796257B (en) | Flexible data authentication | |
CN105554146B (en) | A kind of remote access method and device | |
US8943124B2 (en) | Systems and methods for customizing mobile applications based upon user associations with one or more entities | |
CN103593773A (en) | Product anti-fake method and system and client terminal | |
CN104158889B (en) | Card information querying method and Cloud Server | |
CN102171712A (en) | Identity and authentication system using aliases | |
CN106357699A (en) | Network system, service platform and login method and system of service platform | |
CN110826043A (en) | Digital identity application system and method, identity authentication system and method | |
CN104125203A (en) | Permission management method and system | |
CN103369038B (en) | Platform serves PaaS management platform and method | |
CN102215237A (en) | Implementation method for grade-based passive registered real-name alumni service | |
US9274669B1 (en) | Customizing user interfaces for multiple different clients | |
CN109118291B (en) | User authentication method and device in advertisement task popularization and computer equipment | |
US11968538B1 (en) | Access controlling network architectures and systems, having cellular network components and elements modified to host access controlling schemas designed to transform and/or facilitate cellular communication signals in accordance with novel cellular communications protocols with multi-part multi-functional address signaling, and methods for use thereof | |
CN106415591A (en) | Electronic device, system and method for nfc | |
CN108650098A (en) | The method and device of User Defined verification mode | |
CN105607938B (en) | Security application interface elements configuration method | |
CN106664535B (en) | A kind of method for sending information, device, terminal device and system | |
CN112669157A (en) | Transaction method, device and system based on block chain and readable storage medium | |
CN109104368A (en) | A kind of request connection method, device, server and computer readable storage medium | |
CN108390848A (en) | A kind of information witness method and device | |
CN103415847A (en) | A system and method for accessing a service | |
CN106657112A (en) | Authentication method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |